import bind-9.11.26-6.el8
This commit is contained in:
parent
2c8eb607cd
commit
020fe571be
44
SOURCES/bind-9.11-CVE-2021-25214.patch
Normal file
44
SOURCES/bind-9.11-CVE-2021-25214.patch
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
From 4eff09c6b1e524b0efc393ee948b5c4cdf16ccb8 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Mark Andrews <marka@isc.org>
|
||||||
|
Date: Wed, 3 Feb 2021 11:10:20 +1100
|
||||||
|
Subject: [PATCH] Check SOA owner names in zone transfers
|
||||||
|
|
||||||
|
An IXFR containing SOA records with owner names different than the
|
||||||
|
transferred zone's origin can result in named serving a version of that
|
||||||
|
zone without an SOA record at the apex. This causes a RUNTIME_CHECK
|
||||||
|
assertion failure the next time such a zone is refreshed. Fix by
|
||||||
|
immediately rejecting a zone transfer (either an incremental or
|
||||||
|
non-incremental one) upon detecting an SOA record not placed at the apex
|
||||||
|
of the transferred zone.
|
||||||
|
---
|
||||||
|
lib/dns/xfrin.c | 14 ++++++++++++++
|
||||||
|
1 file changed, 14 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/lib/dns/xfrin.c b/lib/dns/xfrin.c
|
||||||
|
index 3a3f407289..0ba82e4974 100644
|
||||||
|
--- a/lib/dns/xfrin.c
|
||||||
|
+++ b/lib/dns/xfrin.c
|
||||||
|
@@ -477,6 +477,20 @@ xfr_rr(dns_xfrin_ctx_t *xfr, dns_name_t *name, uint32_t ttl,
|
||||||
|
dns_rdatatype_ismeta(rdata->type))
|
||||||
|
FAIL(DNS_R_FORMERR);
|
||||||
|
|
||||||
|
+ /*
|
||||||
|
+ * Immediately reject the entire transfer if the RR that is currently
|
||||||
|
+ * being processed is an SOA record that is not placed at the zone
|
||||||
|
+ * apex.
|
||||||
|
+ */
|
||||||
|
+ if (rdata->type == dns_rdatatype_soa &&
|
||||||
|
+ !dns_name_equal(&xfr->name, name)) {
|
||||||
|
+ char namebuf[DNS_NAME_FORMATSIZE];
|
||||||
|
+ dns_name_format(name, namebuf, sizeof(namebuf));
|
||||||
|
+ xfrin_log(xfr, ISC_LOG_DEBUG(3), "SOA name mismatch: '%s'",
|
||||||
|
+ namebuf);
|
||||||
|
+ FAIL(DNS_R_NOTZONETOP);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
redo:
|
||||||
|
switch (xfr->state) {
|
||||||
|
case XFRST_SOAQUERY:
|
||||||
|
--
|
||||||
|
2.26.3
|
||||||
|
|
38
SOURCES/bind-9.11-rh1935152.patch
Normal file
38
SOURCES/bind-9.11-rh1935152.patch
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
From 4757898440d52b0adbf7ec7ee7f0f89b61aac0fb Mon Sep 17 00:00:00 2001
|
||||||
|
From: Mark Andrews <marka@isc.org>
|
||||||
|
Date: Fri, 18 Dec 2020 13:31:07 +1100
|
||||||
|
Subject: [PATCH] Inactive incorrectly incremented
|
||||||
|
|
||||||
|
It is possible to have two threads destroying an rbtdb at the same
|
||||||
|
time when detachnode() executes and removes the last reference to
|
||||||
|
a node between exiting being set to true for the node and testing
|
||||||
|
if the references are zero in maybe_free_rbtdb(). Move NODE_UNLOCK()
|
||||||
|
to after checking if references is zero to prevent detachnode()
|
||||||
|
changing the reference count too early.
|
||||||
|
|
||||||
|
(cherry picked from commit 859d2fdad6d1c6ff20083a4c463a929cbeb26438)
|
||||||
|
(cherry picked from commit 25150c15e7cfa73289f04470e2e699ebb7c28fef)
|
||||||
|
---
|
||||||
|
lib/dns/rbtdb.c | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/lib/dns/rbtdb.c b/lib/dns/rbtdb.c
|
||||||
|
index 8ea4d47..77ef7a4 100644
|
||||||
|
--- a/lib/dns/rbtdb.c
|
||||||
|
+++ b/lib/dns/rbtdb.c
|
||||||
|
@@ -1460,11 +1460,11 @@ maybe_free_rbtdb(dns_rbtdb_t *rbtdb) {
|
||||||
|
for (i = 0; i < rbtdb->node_lock_count; i++) {
|
||||||
|
NODE_LOCK(&rbtdb->node_locks[i].lock, isc_rwlocktype_write);
|
||||||
|
rbtdb->node_locks[i].exiting = true;
|
||||||
|
- NODE_UNLOCK(&rbtdb->node_locks[i].lock, isc_rwlocktype_write);
|
||||||
|
if (isc_refcount_current(&rbtdb->node_locks[i].references)
|
||||||
|
== 0) {
|
||||||
|
inactive++;
|
||||||
|
}
|
||||||
|
+ NODE_UNLOCK(&rbtdb->node_locks[i].lock, isc_rwlocktype_write);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (inactive != 0) {
|
||||||
|
--
|
||||||
|
2.26.3
|
||||||
|
|
32
SOURCES/bind-9.11-rh1980757.patch
Normal file
32
SOURCES/bind-9.11-rh1980757.patch
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
From a503519533eb375a5ce1f7566bfc153aac980d87 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Petr Mensik <pemensik@redhat.com>
|
||||||
|
Date: Fri, 9 Jul 2021 20:52:21 +0200
|
||||||
|
Subject: [PATCH] Use proper entropy to initialize tsig keyname
|
||||||
|
|
||||||
|
Random names used on GSS backed nsupdate can conflict in specific
|
||||||
|
situations. That might include starting a lot of machines from
|
||||||
|
containers, where they took all similar time to start. PID and timestamp
|
||||||
|
would be similar and therefore randomness is quite low. Use entropy to
|
||||||
|
generate more random identifier and reduce chance of conflict.
|
||||||
|
---
|
||||||
|
bin/nsupdate/nsupdate.c | 4 +++-
|
||||||
|
1 file changed, 3 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/bin/nsupdate/nsupdate.c b/bin/nsupdate/nsupdate.c
|
||||||
|
index 458aa76..d9e5a2b 100644
|
||||||
|
--- a/bin/nsupdate/nsupdate.c
|
||||||
|
+++ b/bin/nsupdate/nsupdate.c
|
||||||
|
@@ -2941,7 +2941,9 @@ start_gssrequest(dns_name_t *master) {
|
||||||
|
|
||||||
|
keyname = dns_fixedname_initname(&fkname);
|
||||||
|
|
||||||
|
- isc_random_get(&val);
|
||||||
|
+ result = isc_entropy_getdata(entropy, &val, sizeof(val), NULL, 0);
|
||||||
|
+ if (result != ISC_R_SUCCESS)
|
||||||
|
+ isc_random_get(&val);
|
||||||
|
result = isc_string_printf(mykeystr, sizeof(mykeystr), "%u.sig-%s",
|
||||||
|
val, namestr);
|
||||||
|
if (result != ISC_R_SUCCESS)
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
@ -68,7 +68,7 @@ Summary: The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) serv
|
|||||||
Name: bind
|
Name: bind
|
||||||
License: MPLv2.0
|
License: MPLv2.0
|
||||||
Version: 9.11.26
|
Version: 9.11.26
|
||||||
Release: 4%{?PATCHVER:.%{PATCHVER}}%{?PREVER:.%{PREVER}}%{?dist}
|
Release: 6%{?PATCHVER:.%{PATCHVER}}%{?PREVER:.%{PREVER}}%{?dist}
|
||||||
Epoch: 32
|
Epoch: 32
|
||||||
Url: https://www.isc.org/downloads/bind/
|
Url: https://www.isc.org/downloads/bind/
|
||||||
#
|
#
|
||||||
@ -156,6 +156,12 @@ Patch177:bind-9.11-serve-stale.patch
|
|||||||
Patch178:bind-9.11-dhcp-time-monotonic.patch
|
Patch178:bind-9.11-dhcp-time-monotonic.patch
|
||||||
Patch179:bind-9.11-CVE-2020-8625.patch
|
Patch179:bind-9.11-CVE-2020-8625.patch
|
||||||
Patch180:bind-9.11-CVE-2021-25215.patch
|
Patch180:bind-9.11-CVE-2021-25215.patch
|
||||||
|
# https://gitlab.isc.org/isc-projects/bind9/commit/dfadbc9d7b485b1af62d77ad6c309792bbaabfdf
|
||||||
|
Patch181:bind-9.11-CVE-2021-25214.patch
|
||||||
|
# https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/4533/diffs?commit_id=25150c15e7cfa73289f04470e2e699ebb7c28fef
|
||||||
|
Patch182:bind-9.11-rh1935152.patch
|
||||||
|
# https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/5253
|
||||||
|
Patch183:bind-9.11-rh1980757.patch
|
||||||
|
|
||||||
# SDB patches
|
# SDB patches
|
||||||
Patch11: bind-9.3.2b2-sdbsrc.patch
|
Patch11: bind-9.3.2b2-sdbsrc.patch
|
||||||
@ -552,6 +558,9 @@ are used for building ISC DHCP.
|
|||||||
%patch178 -p1 -b .time-monotonic
|
%patch178 -p1 -b .time-monotonic
|
||||||
%patch179 -p1 -b .CVE-2020-8625
|
%patch179 -p1 -b .CVE-2020-8625
|
||||||
%patch180 -p1 -b .CVE-2021-25215
|
%patch180 -p1 -b .CVE-2021-25215
|
||||||
|
%patch181 -p1 -b .CVE-2021-25214
|
||||||
|
%patch182 -p1 -b .rh1935152
|
||||||
|
%patch183 -p1 -b .rh1980757
|
||||||
|
|
||||||
mkdir lib/dns/tests/testdata/dstrandom
|
mkdir lib/dns/tests/testdata/dstrandom
|
||||||
cp -a %{SOURCE50} lib/dns/tests/testdata/dstrandom/random.data
|
cp -a %{SOURCE50} lib/dns/tests/testdata/dstrandom/random.data
|
||||||
@ -1163,7 +1172,7 @@ fi
|
|||||||
%triggerin -- selinux-policy < 3.14.1-44
|
%triggerin -- selinux-policy < 3.14.1-44
|
||||||
# Failsafe for upgrades, set to new default
|
# Failsafe for upgrades, set to new default
|
||||||
if [ -x "%{_sbindir}/selinuxenabled" -a -x "%{_sbindir}/setsebool" ] && %{_sbindir}/selinuxenabled; then
|
if [ -x "%{_sbindir}/selinuxenabled" -a -x "%{_sbindir}/setsebool" ] && %{_sbindir}/selinuxenabled; then
|
||||||
"%{_sbindir}/setsebool" -P named_write_master_zones=1
|
"%{_sbindir}/setsebool" -P named_write_master_zones=1
|
||||||
fi
|
fi
|
||||||
%end
|
%end
|
||||||
|
|
||||||
@ -1603,8 +1612,16 @@ rm -rf ${RPM_BUILD_ROOT}
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Jul 09 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-6
|
||||||
|
- Use random entropy to generate unique TKEY identifiers (#1980916)
|
||||||
|
|
||||||
|
* Fri May 07 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-5
|
||||||
|
- Fix possible assertion failure isc_refcount_current == 0 in free_rbtdb
|
||||||
|
(#1953056)
|
||||||
|
|
||||||
* Tue Apr 27 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-4
|
* Tue Apr 27 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-4
|
||||||
- Possible assertion failure on DNAME processing (CVE-2021-25215)
|
- Possible assertion failure on DNAME processing (CVE-2021-25215)
|
||||||
|
- Insufficient IXFR checks could lead to assertion failure (CVE-2021-25214)
|
||||||
|
|
||||||
* Mon Feb 15 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-3
|
* Mon Feb 15 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-3
|
||||||
- Fix off-by-one bug in ISC SPNEGO implementation (CVE-2020-8625)
|
- Fix off-by-one bug in ISC SPNEGO implementation (CVE-2020-8625)
|
||||||
|
Loading…
Reference in New Issue
Block a user